sponsored by Trend Micro, Inc.
Posted:  15 Jul 2010
Published:  15 Jul 2010
Format:  PDF
Length:  9  Page(s)
Type:  White Paper
Language:  English
ABSTRACT:

Mobile computers that connect directly to the Internet outside of a company’s firewall can introduce risk into the corporate network and thus require a higher level of security to protect against network intrusions. Host intrusion defense systems combine intrusion detection and prevention capabilities, and run on the host itself.This white paper examines a blended approach to host intrusion defense in search optimal security combined with an ideal balance between flexibility, control, and ease of management. Specific examples highlight the benefits and pitfalls of the many different filtering techniques.






BROWSE RELATED RESOURCES
Application Security | Endpoint Security | Firewall Management | Firewall Server Software | Security | Security Management | Security Systems

View All Resources sponsored by Trend Micro, Inc.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement